Home Authors Posts by CISOMAG

CISOMAG

2095 POSTS 0 COMMENTS

1 in 5 Risky Links Contain Hidden Malware: Report

Opening or downloading malicious links or attachments could result in severe security issues. With employees working remotely across the globe,  corporate data security has...

CISA Issues Advisory on Mitigating Risks Originating from Tor

The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. issued security guidelines on how to  mitigate cyber risks  originating from anonymity networks like...

Productivity and Stress Concern Risk Managers While Working from Home

A survey from the Global Association of Risk Professionals (GARP) revealed that risk managers across the world effectively handled the sudden transition to work-from-home...

Cloud-Ready Shared Responsibility TPRM Tips for CISOs

Third-Party Risk Management (TPRM), commonly referred to as vendor or supply chain risk management, is not a new concept. It was originally founded with...

72% of Remote Workforce Gained Cybersecurity Awareness in Lockdown: Report

A survey from cybersecurity solutions provider Trend Micro revealed that nearly 72% of remote workers are more conscious about their organization’s cybersecurity and data...

Europe Introduces 13 New IoT Cybersecurity Provisions

To address the concern over the rising number of devices at home being connected to the Internet, the European Telecommunications Standards Institute (ETSI) launched...

PII of Thousands of Users Exposed in Multi-Stage Bitcoin Scam

Threat intelligence firm Group-IB discovered personal records of thousands of users from the U.K., the U.S., South Africa, Spain, Australia, Singapore, Malaysia, and other...

Stolen Data From 945 Websites Exposed on Darknet Forums: Report

Researchers from cybersecurity firm Lucy Security discovered a collection of two SQL databases exposed on darknet forums. It was found that the databases contain...

3 Signs That Your Company Has A Security First Mindset

As organizations consider moving to the cloud or architecting their applications in the cloud, security is top of mind. In the June 2020 cloud...

50% of Users Online Fall Victim to Cyberattacks: Report

Threat actors are using sophisticated hacking methods to target users online. It’s not just about taking advantage of Coronavirus-related anxieties, but attackers are using...

MOST POPULAR

RECENT POSTS